IECON 2012 - 38th Annual Conference on IEEE Industrial Electronics Society 2012
DOI: 10.1109/iecon.2012.6388515
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption based on convolution operation in the gyrator transform domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…When the convolution filter is applied, a new smooth, fuzzy or blurry image is obtained, it is possible to obtain edge detection. The convolution filter is also called convolution kernel because there exists a singular matrix to obtain different image transformation [1,2].…”
Section: The Convolution Filtermentioning
confidence: 99%
“…When the convolution filter is applied, a new smooth, fuzzy or blurry image is obtained, it is possible to obtain edge detection. The convolution filter is also called convolution kernel because there exists a singular matrix to obtain different image transformation [1,2].…”
Section: The Convolution Filtermentioning
confidence: 99%
“…Chaotic sequence with random transformation of random seeds of the cloud model, repeated operation produces uncorrelated multiple sets of dynamic chaotic sequences, and it increases the chaotic randomness, expands the key space, and increases the chaotic range. Using hybrid chaotic sequences to scramble image pixel points spliced by RGB components, and then combining matrix convolution operations in convolutional neural networks [31], the matrix convolution operation is used to permute the pixel points, and enhance the anti-attack ability of the ciphertext. Finally, XOR operation diffuses pixels with the chaotic sequence and the pre-adjacent pixel values, which achieves the overall design of position scrambling, numerical transformation, and diffusion of the image encryption process.…”
Section: Introductionmentioning
confidence: 99%
“…Convolution is an operation between two functions which produces the altered version of one of the function [14]. Convolution includes the application such as image and signal processing, electrical engineering, computer vision, differential equations, probability and statistics [35].…”
Section: Introductionmentioning
confidence: 99%